Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-5777 PoC — Citrix NetScaler ADC和Citrix NetScaler Gateway 安全漏洞

Source
Associated Vulnerability
Title:Citrix NetScaler ADC和Citrix NetScaler Gateway 安全漏洞 (CVE-2025-5777)
Description:Citrix NetScaler ADC和Citrix NetScaler Gateway都是美国Citrix公司的产品。Citrix NetScaler ADC是一个应用程序交付和安全性平台。Citrix NetScaler Gateway是一种安全远程访问的解决方案。 Citrix NetScaler ADC和Citrix NetScaler Gateway存在安全漏洞,该漏洞源于NetScaler Management Interface输入验证不足,可能导致内存过度读取。
Description
Update the old POC of CVE-2025-5777 Citrix NetScaler Memory leak
Readme
# CVE-2025-5777 – Citrix NetScaler Memory Leak (Updated PoC)

This repository contains an **updated Proof-of-Concept (PoC)** for exploiting **CVE-2025-5777** – a memory leak vulnerability affecting Citrix NetScaler.

The original PoC by [0xgh057r3c0n](https://github.com/0xgh057r3c0n/CVE-2025-5777) works perfectly,  
but some users reported connection errors due to **DNS issues, IPv6 quirks, or incorrect URL formats**.

### **What’s New in This Updated PoC**
- **Clearer error messages** for DNS failures and incorrect URLs
- **IPv4-only mode** by default to avoid IPv6 connectivity problems
- **Validation for `http://` or `https://` in the target URL**
- No changes to the **actual vulnerability logic** — the exploit works exactly the same
File Snapshot

[4.0K] /data/pocs/2d05db214c283353e7aa6389548eee0435f68ef0 ├── [5.5K] CVE-2025-5777.py ├── [ 754] README.md └── [ 31] requirements.txt 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.